An attack that involves the capture of transmitted authentication or access control information and its subsequent retransmission with the intent of producing an unauthorized effect or gaining unauthorized access.
Source(s):
CNSSI 4009-2015
under replay attacks
An attack in which the Attacker is able to replay previously captured messages (between a legitimate Claimant and a Verifier) to masquerade as that Claimant to the Verifier or vice versa.
Source(s):
NIST SP 800-53 Rev. 5
from
NIST SP 800-63-3
NIST SP 800-63-3
under Replay Attack